Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 238

Full-Text Articles in Physical Sciences and Mathematics

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed May 2024

Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed

Honors Theses

The exponential growth of technology, epitomized by Moore's Law – “the observation that the number of transistors on an integrated circuit will double every two years”– has propelled the swift evolution of Artificial Intelligence (AI) and Internet of Things (IoT) technologies. This phenomenon has revolutionized various facets of daily life, from smart home devices to autonomous vehicles, reshaping how individuals interact with the world around them. However, as governments worldwide increasingly harness these innovations to monitor and collect personal data, profound privacy concerns have arisen among the general populace. Despite the ubiquity of AI and IoT in modern society, formal …


Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum Dec 2023

Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum

Honors Theses

Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …


Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods May 2023

Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods

Honors Theses

This thesis aims to identify timestamps of rats’ neuronal activity that best determine behavior using a machine learning model. Neuronal data is a complex and high-dimensional dataset, and identifying the most informative features is crucial for understanding the underlying neuronal processes. The Lasso regularization technique is employed to select the most relevant features of the data to the model’s prediction. The results of this study provide insights into the key activity indicators that are associated with specific behaviors or cognitive processes in rats, as well as the effect that stress can have on neuronal activity and behavior. Ultimately, it was …


Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev May 2023

Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev

Honors Theses

Research related to Biology often utilizes machine learning models that are ultimately uninterpretable by the researcher. It would be helpful if researchers could leverage the same computing power but instead gain specific insight into decision-making to gain a deeper understanding of their domain knowledge. This paper seeks to select features and derive rules from a machine learning classification problem in biochemistry. The specific point of interest is five species of Glycyrrhiza, or Licorice, and the ability to classify them using High-Performance Thin Layer Chromatography (HPTLC) images. These images were taken using HPTLC methods under varying conditions to provide eight …


Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson May 2023

Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson

Honors Theses

In the emerging digital world that we find ourselves in, it becomes apparent that data collection has become a staple of daily life, whether we like it or not. This research discussion aims to bring light to just how much one’s own digital identity is valued in the technologically-infused world of today, with distinct research and local examples to bring awareness to the ethical implications of your online presence. The paper in question examines anecdotal and research evidence of the collection of data, both through true and unjust means, as well as ethical implications of what this information truly represents. …


Computer Organization And Assembly Language Embedded Firmware Overhaul, Elaine Yun Ru Chan Apr 2023

Computer Organization And Assembly Language Embedded Firmware Overhaul, Elaine Yun Ru Chan

Honors Theses

The WMU Computer Organization and Assembly Language class has encountered some difficulties in the past several years regarding the procurement of required hardware and software for the curriculum. This has led to a number of challenges for students, including:

  • Difficulty in obtaining the necessary hardware and software
  • Inability to complete assignments and projects due to hardware or software failures
  • Frustration and anxiety caused by the challenges of the course

To address these challenges, a new choice of embedded firmware was researched and developed. This firmware allows for more reliable flashing of the MSP430 Microcontroller and remains reliable on modern operating …


Tracking System Effectiveness For Texas Police Departments In Low-Income Communities, Jakob Scarcelli Apr 2023

Tracking System Effectiveness For Texas Police Departments In Low-Income Communities, Jakob Scarcelli

Honors Theses

No abstract provided.


On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers Jan 2023

On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers

Honors Theses

Recent research highlights the viability of webcam-based eye tracking as a low-cost alternative to dedicated remote eye trackers. Simultaneously, research shows the importance of understanding emotions of software developers, where it was found that emotions have significant effects on productivity, code quality, and team dynamics. In this paper, we present our work towards an integrated eye-tracking and affect recognition tool for use during software development. This combined approach could enhance our understanding of software development by combining information about the code developers are looking at, along with the emotions they experience. The presented tool utilizes an unmodified webcam to capture …


The Implementation Of Augmented Reality And Low Latency Protocols In Musical Instrumental Collaborations, Qixiao Zhu Jan 2023

The Implementation Of Augmented Reality And Low Latency Protocols In Musical Instrumental Collaborations, Qixiao Zhu

Honors Theses

Past projects involving musical software have been completely virtual, while these software do well in entertainment and education, there is the question of whether these software are playable to the same extent as physical musical instruments. The software presented in this paper, "AR Jam", utilizes various software and hardware tools to form a networked mixed reality system for the users to play music on. The intention of this project is to seek new ways to explore more playable musical instruments in the digital world. The paper presents the software's implementation, challenges such as optimization problems of the synthesizer, and the …


Critically Observing The Challenges And Changes: An Analysis On Covid-19’S Impact With An Emphasis On Students In Higher Education, Landon Perkins Dec 2022

Critically Observing The Challenges And Changes: An Analysis On Covid-19’S Impact With An Emphasis On Students In Higher Education, Landon Perkins

Honors Theses

This project involves comparing different visualizations related to COVID-19 and higher education in order to determine key impacts of the COVID-19 pandemic on students in higher education, as well as higher education as a whole. The main metrics used to determine the impact were mental health indicators for anxiety or depressive disorders, enrollment numbers by control type (public, private non-profit, or private for-profit) and state for 2020 and 2021, and state mandate lift dates for a variety of mandates implemented across the United States. These metrics were analyzed both individually and against each other to determine if they had any …


Improving Adjacency List Storage Methods For Polypeptide Similarity Analysis, Arianna Swensen Dec 2022

Improving Adjacency List Storage Methods For Polypeptide Similarity Analysis, Arianna Swensen

Honors Theses

Protein design is a complex biomolecular and computational problem. Working on increasingly large protein folding problems requires an improvement in current analysis methods available. This work first discusses various methods of protein design, including de novo protein design, which is the primary focus of this thesis. Then, a new approach utilizing a B+ tree to effectively store and query a graph of keys and vertices is proposed in order to store the number of times two polypeptides are considered to be similar. This approach is found to have a reduction in time complexity from current mapping methods and thus provides …


Impact Of Movements On Facial Expression Recognition, Zhebin Yin Jun 2022

Impact Of Movements On Facial Expression Recognition, Zhebin Yin

Honors Theses

The ability to recognize human emotions can be a useful skill for robots. Emotion recognition can help robots understand our responses to robot movements and actions. Human emotions can be recognized through facial expressions. Facial Expression Recognition (FER) is a well-established research area, how- ever, the majority of prior research is based on static datasets of images. With robots often the subject is moving, the robot is moving, or both. The purpose of this research is to determine the impact of movement on facial expression recognition. We apply a pre-existing model for FER, which performs around 70.86% on a given …


Tracking Xenophobic Terminology On Twitter Using Nlp, Harper Lyon Jun 2022

Tracking Xenophobic Terminology On Twitter Using Nlp, Harper Lyon

Honors Theses

Social media is a major driver of political thought, with platforms like Facebook, Twitter, and TikTok having a massive impact on how people think and vote. For this reason we should take seriously any large shifts in the language used to describe issues or groups on social media, as these are likely to either denote a change in political thought or even forecast the same. Of particular interest, given the international reach of social media, is the way that discussions around foreign relations and immigration play out. In the United States of America online spaces have become the default space …


Corrective Feedback Timing In Kanji Writing Instruction Apps, Phoenix Mulgrew Jun 2022

Corrective Feedback Timing In Kanji Writing Instruction Apps, Phoenix Mulgrew

Honors Theses

The focus of this research paper is to determine the correct time to provide corrective feedback to people who are learning how to write Japanese kanji. To do this, we developed a system that is able to recognize Japanese kanji that is handwritten onto an iPad screen and check for errors such as wrong stroke order. Previous research has achieved success in developing similar systems, but this project is unique because the research question involves the timing of corrective feedback. In particular, we are looking at whether immediate or delayed corrective feedback results in better learning.


Investigation Of Python Variable Privacy, Joshua Bartholomew May 2022

Investigation Of Python Variable Privacy, Joshua Bartholomew

Honors Theses

This study looks at the relative security of Python regarding private variables and functions used in most other programming languages. Python has only grown in popularity due to its simple syntax and developing capabilities. However, little research has been published about how secure Python code and programs compiled from Python code actually are. This research seeks to expose vulnerabilities in Python code and determine what must be done for these vulnerabilities to be exploited by hackers to abuse potentially sensitive information contained within the program.

The proposed methodology includes examining the private variable concept in other programming languages and conducting …


Computational Investigations Into Astrochemical Inorganic Oxides, Ammonia Borane, And Genetic Algorithms, E. Michael Valencia May 2022

Computational Investigations Into Astrochemical Inorganic Oxides, Ammonia Borane, And Genetic Algorithms, E. Michael Valencia

Honors Theses

The formulations of quantum mechanics in the early 1900s were exciting theoretical discoveries, but were not practical to apply until the advent of computers and the subsequent computational methods in 1951. With the introduction of tractable simplifications, procedures such as Hartree-Fock allowed for determination of properties of non-trivial systems. Presently, huge leads of computational power have allowed for extremely precise, quantitative work that can be applied to the human body, synthesis, or even astrochemical processes. This thesis presents works concerning 1) the history of quantum mechanics; 2) a brief primer on computational chemistry and its methods; 3) inorganic oxides in …


Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker May 2022

Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker

Honors Theses

With the recent explosion of popularity of virtual and mixed reality, an important question has arisen: “Is there a way to create a better blend of real and virtual worlds in a mixed reality experience?” This research attempts to determine whether a visual filter can be created and applied to virtual objects to better convince the brain into interpreting a composite of virtual and real views as one seamless view. The method devised in this thesis is being called 'Diminished Virtual Reality'. The results found in this study show that when presented with a scene composed of a combination of …


Sandworms And Computer Worms: An Assessment Of American Critical Infrastructure Cyber Vulnerabilities And The Russian Federation's Growing Offensive Capabilities, Spencer Johns Apr 2022

Sandworms And Computer Worms: An Assessment Of American Critical Infrastructure Cyber Vulnerabilities And The Russian Federation's Growing Offensive Capabilities, Spencer Johns

Honors Theses

Bottom Line Up Front: It is highly likely that the Russian GRU has the capability, resources, and intent to execute cyberweapon attacks against American critical infrastructure in times of heightened tensions, either as a warning or a first strike. I also assess that much of current American critical infrastructure is not secure enough to withstand a coordinated assault by the GRU, and very likely has numerous severe vulnerabilities known by the GRU.


Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines Apr 2022

Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines

Honors Theses

No abstract provided.


90snet:, Seth Richard Mar 2022

90snet:, Seth Richard

Honors Theses

No abstract provided.


Nft Sneaker Marketplace Design, Testing, And Challenges, Chris Zhu Jan 2022

Nft Sneaker Marketplace Design, Testing, And Challenges, Chris Zhu

Honors Theses

This paper introduces the preliminary background and implementation of the NFT sneaker marketplace. Specifically, we build sneaker NFTs on top of ERC-20 within the Ethereum network and use a top-to-bottom design mechanism. Our website performs well in its functionality, compatibility, and performance. We discuss possible future steps for security implementation. In particular, we recommend using a cold wallet for clients' transactions and implementing multi-signature contracts to avoid spoofing and repudiation. Introducing the sneaker NFT marketplace will vastly reduce the costs of transactions and delivery time in the physical sneaker marketplace. We hope investors in the physical asset space can find …


Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa Jan 2022

Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa

Honors Theses

In this paper, we analyze the decoding of cyclic codes. First, we introduce linear and cyclic codes, standard decoding processes, and some standard theorems in coding theory. Then, we will introduce Gr¨obner Bases, and describe their connection to the decoding of cyclic codes. Finally, we go in-depth into how we decode cyclic codes using the key equation, and how a breakthrough by A. Brinton Cooper on decoding BCH codes using Gr¨obner Bases gave rise to the search for a polynomial-time algorithm that could someday decode any cyclic code. We discuss the different approaches taken toward developing such an algorithm and …


Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu Jan 2022

Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu

Honors Theses

The entrainment map, developed by Dr.Diekman and Dr.Bose, is claimed to be a 1-dimensional map that produces a better prediction for phase-locking than methods than the phase response curve for circadian models. In his paper, he constructs the entrainment map for the two-dimensional circadian model, the Novak-Tyson model, and the other two higher-dimensional circadian models. For this thesis, we concentrate on exploring if it is viable to construct the entrainment map for other circadian models that are not included in his paper: the Becker-Weimann model and the Relogio model. In addition, we discuss the challenges of constructing the entrainment map …


Surface Reconstruction Library, Jhye Tim Chi Dec 2021

Surface Reconstruction Library, Jhye Tim Chi

Honors Theses

The project aims to convert an arbitrary point cloud into a triangular mesh. Point clouds are a list of 3d points that model the topology of an object. Point clouds can have various issues, such as missing or noisy data. For the scope, we had no control over point cloud generation. We were also unable to deal with underlying registration or alignment problems. Triangular meshes are a list of triangles that have 3d vertices. This aggregate list of triangles defines the reconstructed surface. Our project implementation is based on Alexander Hornung and Leif Kobbelt’s method for surface reconstruction using the …


Class Scheduling Web App, Anubhav Rawal Dec 2021

Class Scheduling Web App, Anubhav Rawal

Honors Theses

This Scheduling Web Application in Django was built to allow a user to create a schedule for upcoming semesters. Users with appropriate privileges could upload an excel schedule to which instructors could be assigned. Additionally features included dynamic editing for admin users and viewing the main schedule for general users. Our goal was to create an application from the ground up using the Django framework to accomplish these tasks.


Ferris Bakes, Ferris Dehart Dec 2021

Ferris Bakes, Ferris Dehart

Honors Theses

No abstract provided.


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist May 2021

The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist

Honors Theses

Technology has played an immense role in the evolution of healthcare delivery for the United States and on an international scale. Today, perhaps no innovation offers more potential than artificial intelligence. Utilizing machine intelligence as opposed to human intelligence for the purposes of planning, offering solutions, and providing insights, AI has the ability to alter traditional dynamics between doctors, patients, and administrators; this reality is now producing both elation at artificial intelligence's medical promise and uncertainty regarding its capacity in current systems. Nevertheless, current trends reveal that interest in AI among healthcare stakeholders is continuously increasing, and with the current …


Effects Of Bounding Tree Complexity On Immersion In A Virtual Environment, Jonathan Caputo May 2021

Effects Of Bounding Tree Complexity On Immersion In A Virtual Environment, Jonathan Caputo

Honors Theses

Bounding boxes are volumetric spaces in a 3D environment defined by a set of points that denote the area of collision for a given object. Bounding trees are known as a collection of bounding boxes. Simple bounding trees contain few bounding boxes and complex bounding trees contain many. Our research aims to find the relationship between the complexity of a bounding tree and a user's immersion in a 3D virtual environment. We created an algorithm that used the bounding trees to check for when an object collides with another. Using this algorithm, we ran a user study where users would …